{"draft":"","doc_id":"RFC1750","title":" Randomness Recommendations for Security ","authors":["D. Eastlake 3rd","S. Crocker","J. Schiller"],"format":["ASCII","HTML"],"page_count":"30","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Legacy","abstract":" Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This paper points out many pitfalls in using traditional pseudo-random number generation techniques for choosing such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. This memo provides information for the Internet community. This memo does not specify an Internet standard of any kind. ","pub_date":"November 1994","keywords":["Random","Numbers","Seed"],"obsoletes":[],"obsoleted_by":["RFC4086"],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC1750","errata_url":null}